Dimensions of the Threat to the Self Posed by Deep Brain Stimulation…
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
CYBORG MIND What Brain–Computer And
CYBORG MIND What Brain‒Computer and Mind‒Cyberspace Interfaces Mean for Cyberneuroethics CYBORG MIND Edited by Calum MacKellar Offers a valuable contribution to a conversation that promises to only grow in relevance and importance in the years ahead. Matthew James, St Mary’s University, London ith the development of new direct interfaces between the human brain and comput- Wer systems, the time has come for an in-depth ethical examination of the way these neuronal interfaces may support an interaction between the mind and cyberspace. In so doing, this book does not hesitate to blend disciplines including neurobiology, philosophy, anthropology and politics. It also invites society, as a whole, to seek a path in the use of these interfaces enabling humanity to prosper while avoiding the relevant risks. As such, the volume is the fi rst extensive study in cyberneuroethics, a subject matter which is certain to have a signifi cant impact in the twenty-fi rst century and beyond. Calum MacKellar is Director of Research of the Scottish Council on Human Bioethics, Ed- MACKELLAR inburgh, and Visiting Lecturer of Bioethics at St. Mary’s University, London. His past books EDITED BY What include (as co-editor) The Ethics of the New Eugenics (Berghahn Books, 2014). Brain‒Computer and Mind‒Cyberspace Interfaces Mean for Cyberneuroethics MEDICAL ANTHROPOLOGY EDITED BY CALUM MACKELLAR berghahn N E W Y O R K • O X F O R D Cover image by www.berghahnbooks.com Alexey Kuzin © 123RF.COM Cyborg Mind This open access edition has been made available under a CC-BY-NC-ND 4.0 license thanks to the support of Knowledge Unlatched. -
The Handbook of Information Security for Advanced Neuroprosthetics, ISBN 978-0-692-50161-0, Indianapolis: Synthypnion Academic, 2015, Pp
Chapter 5, "A Two-dimensional Framework of Cognitional Security for Advanced Neuroprosthetics," an excerpt from Gladden, Matthew E., The Handbook of Information Security for Advanced Neuroprosthetics, ISBN 978-0-692-50161-0, Indianapolis: Synthypnion Academic, 2015, pp. 129-168. Developing a two-dimensional cognitional security framework In this chapter we develop a two-dimensional conceptual framework for cognitional security. The first dimension includes nine essential information security attributes or goals for neuroprosthetic devices and device-host sys- tems, namely confidentiality, integrity, availability, possession, authenticity, utility, distinguishability, rejectability, and autonomy. Each of these attributes relates to the device-host system as understood at three different levels, which comprise the second dimension of the framework; the levels are those of the device’s host understood as sapient metavolitional agent, embodied em- bedded organism, and social and economic actor. Below we present this framework in detail and consider its implications for information security for advanced neuroprosthetic devices. Defining security goals for the entire device-host system: nine essential attributes One of the most fundamental ways of understanding information security is through a framework of essential characteristics that a system must possess in order to be secure. One can understand these characteristics as the security “attributes” that an ideal system would possess. However, in practice such characteristics can never be perfectly -
Emergent Neurotechnologies and Challenges to Responsibility Frameworks
Akron Law Review Volume 54 Issue 1 Article 1 Emergent Neurotechnologies and Challenges to Responsibility Frameworks Laura Cabrera Jennifer Carter-Johnson Follow this and additional works at: https://ideaexchange.uakron.edu/akronlawreview Part of the Criminal Law Commons, and the Legal Ethics and Professional Responsibility Commons Please take a moment to share how this work helps you through this survey. Your feedback will be important as we plan further development of our repository. Recommended Citation Cabrera, Laura and Carter-Johnson, Jennifer () "Emergent Neurotechnologies and Challenges to Responsibility Frameworks," Akron Law Review: Vol. 54 : Iss. 1 , Article 1. Available at: https://ideaexchange.uakron.edu/akronlawreview/vol54/iss1/1 This Article is brought to you for free and open access by Akron Law Journals at IdeaExchange@UAkron, the institutional repository of The University of Akron in Akron, Ohio, USA. It has been accepted for inclusion in Akron Law Review by an authorized administrator of IdeaExchange@UAkron. For more information, please contact [email protected], [email protected]. Cabrera and Carter-Johnson: Emergent Neurotechnologies EMERGENT NEUROTECHNOLOGIES AND CHALLENGES TO RESPONSIBILITY FRAMEWORKS Laura Cabrera* and Jennifer Carter-Johnson**1 I. Introduction ................................................................... 2 II. DBS challenges responsibility frameworks ................... 4 A. DBS Changes .......................................................... 4 B. DBS Situational Possibilities ................................. -
The Handbook of Information Security for Advanced Neuroprosthetics, ISBN 978-0-692-50161-0, Indianapolis: Synthypnion Academic, 2015, Pp
Chapter 3, "Critical Challenges in Information Security for Advanced Neuroprosthetics," an excerpt from Gladden, Matthew E., The Handbook of Information Security for Advanced Neuroprosthetics, ISBN 978-0-692-50161-0, Indianapolis: Synthypnion Academic, 2015, pp. 59-103. Information security considerations unique to advanced neuroprosthetics Information security is a large and complex field. While there are funda- mental information security principles whose relevance is universal, the ways in which these principles are applied and elaborated in particular circum- stances is subject to specialized practices and bodies of knowledge. The tech- niques used to secure a large organization’s archive of decades of printed per- sonnel files are different than those used to secure a factory’s robotic manu- facturing systems or an individual consumer’s smartphone. As with all kinds of information systems that have been developed by hu- mankind, advanced neuroprosthetic devices present a unique array of infor- mation security problems and possibilities that exist within a particular set of technological, legal, political, ethical, social, and cultural contexts.1 In this chapter we highlight a number of issues that may not be relevant for many other kinds of information systems but which give rise to considerations that are critical for the information security of advanced neuroprosthetic devices. Many of the issues discussed below constitute recurring themes that will be revisited in different contexts throughout the rest of this book. Device user vs. device host In the case of a smartphone, the person who possesses the device and car- ries it with himself or herself on a daily basis is typically also the primary user and operator of the device: the smartphone’s possessor powers it on and off, 1 For an overview of ethical issues with ICT implants – many of which are relevant for advanced neuroprosthetics – see Hildebrandt & Anrig, “Ethical Implications of ICT Implants” (2012).